Saturday, November 2, 2019

Cybercrime Research Paper Example | Topics and Well Written Essays - 2000 words

Cybercrime - Research Paper Example This IP operated similar to a house address and represented a specific group or a company. Therefore there was an automatic controls system on the internet IP could be traced. This stopped people from trying to use internet as a means of stealing money or another fraud activity because they knew that it could be traced back to them. In the last decade however the growth of internet has been phenomenal. From a mere few million users of the nineties it has grown in to billions. This growth has made it impossible to maintain the old system. Moreover the wireless internet system has made it even more difficult to track internet criminals. This is because airports, bus terminals and even Starbucks coffee shops all have wireless internet facilities. These facilities operate on temporary IPs. This therefore means that each time you connect to the internet a new IP address is assigned to your computer. Thus it becomes almost impossible to track and convict criminals on internet fraud. The co nviction becomes even more difficult as it is not easy to prove anything in the court of law. One of the most popular cyber crimes is the Credit Card frauds. This type of fraud has increased over the years with the increase in usage of credit cards. The availability of all types of services through credit cards ensures that they become an attractive option for fraud, especially when it comes to online purchases. There are millions of business in US and Europe which only accept payments through credit cards. This is no longer restricted to online services as it did in the nineties. Businesses like Netflix have ensured that customers rely completely on credits cards for all types of consumer items. Credit card fraud is the term used for describing the fraud or theft of money committed by using the credit cards in illegal payments and money transactions to obtain illegal goods and services or to illegally transfer funds from others accounts. They are among

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.